首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
对空中目标进行威胁评估和目标分配是阵地防空指挥中心的一项重要工作,威胁评估的准确性将对防空作战的结局产生重大的影响。提出了一种新的威胁评估算法,在综合考虑空中目标态势和作战能力的前提下,分析了影响目标威胁评估的几个因素,并结合装备的战斗性能建立各函数的威胁度隶属函数,求出目标威胁度和排序,最后给出软件流程。  相似文献   

2.
装甲分队目标威胁评估指标的确定,是实现目标威胁评估与排序的先决条件。依据目标的属性特征,以及装甲分队作战特点,建立了目标威胁评估指标体系,并且利用标度法和线性简化等方法对各指标进行了量化。最后,根据不同作战样式提出了指标权重调节向量,使得威胁评估指标更能反映目标战场战术实际。  相似文献   

3.
空间目标威胁评估是空间作战过程中的一个重要环节。结合空间武器对抗的特点,分析了影响空间目标威胁评估的主要因素,构建了空间目标威胁体系和威胁评估示意图,给出了空间目标威胁评估的指标。在威胁评估依据和原则的基础上,建立了基于指标隶属度与信息熵的威胁评估模型。通过实例应用表明,评估模型实现了空间目标威胁评估,为空间作战的指挥决策提供了依据。  相似文献   

4.
导弹阵地空袭目标威胁评估   总被引:2,自引:0,他引:2  
威胁评估是导弹作战决策中一个重要环节.针对导弹阵地作战中空袭目标的实时威胁评估问题,结合阵地实际,文中在分析威胁成因和指标相关性的基础上构建了威胁评估指标体系,利用模糊理论对威胁因素进行了量化处理,基于目标实时信息用组合加权平均模型进行了评估计算.仿真结果表明,该模型能根据实时的目标信息,准确灵敏地评估出目标威胁度,同时考虑了因素的相关性影响,结果更切实合理.  相似文献   

5.
目标威胁度评估是反舰导弹作战指挥决策重要环节之一。针对作战目标属性关联复杂,主观决策缺乏客观依据支撑的问题,采用熵权法及灰色关联法的混合构建目标威胁评估模型,依据有限的作战指标数据,对目标威胁度进行排序,得出了导弹攻击目标的顺序,结果表明混合评估方法的有效性、合理性,为反舰导弹优选攻击目标提供理论支撑。  相似文献   

6.
对作战目标进行威胁评估,是反辐射无人机作战过程中极为重要的环节,威胁评估的准确性将对作战的结局产生重要影响。通过构建威胁评估指标体系,引入模糊隶属度概念对指标进行规范化处理,采用离差最大化方法确定了指标权重,运用灰关联分析法进行威胁评估和排序,最后用实例验证了方法的可行性和正确性。  相似文献   

7.
针对防空武器系统防空作战特点,在对目标威胁程度影响因素分析的基础之上,运用模糊理论和多模型理论探索目标威胁评估问题。设计了一种基于串联模型框架的目标威胁评估方法,该方法采用3个基本模型,基于串联系统思想,经模糊推理融合,得到空中来袭目标的威胁程度。该评估方法层次分明、直观有效,能够较好地满足海上对空防御作战中对目标威胁评估的需要,为舰指挥员决策和防空武器系统火力分配提供一定的依据。  相似文献   

8.
采用贝叶斯网络模型对目标识别、威胁评估是一种有效的定量分析方法。这里首次将贝叶斯网络模型运用到航母编队作战决策中识别水下目标和评估威胁等级。结合部队实际情况分别构建目标识别和威胁评估贝叶斯网络模型;基于部队实践数据、院校专家和查阅资料构建符合实际情况的条件概率表;最后通过仿真实验对水下目标进行识别和评估威胁等级,对比部队相关数据验证了贝叶斯网络对航母编队目标识别和威胁评估的有效性,能够为航母编队指挥员反潜作战提供一定的辅助决策。  相似文献   

9.
现代防空作战中,各种空袭兵器突袭能力不断增强,对我方目标构成了极大威胁.因此,需要对空袭兵器的威胁能力进行评估,合理分配各种防空火力,以达到保护我方目标的目的.研究了现代防空作战背景下,空袭兵器威胁能力评估的全过程,给出了贫信息下,威胁能力评估的算法,建立了数学模型,最后用实例说明了该评估方法的实用性.  相似文献   

10.
针对装甲目标威胁评估指标权重随着作战时节的动态变化,容易导致评估结果前后有差异的问题,运用灰色区间关联法,引入区间灰数与灰度,对评估指标区间内的不确定性信息进行了量化。同时,运用变权理论,通过调整权向量,构造反映作战时节内装甲目标威胁评估指标权重变化的均衡函数,对装甲目标威胁程度进行了科学、合理的评估,解决了传统评估方法中评估结果与实际威胁程度不一致的问题,为下一步的威胁评估研究工作提供了理论参考与方法支持。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号